- Table View
- List View
Information Security and Privacy: 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14–16, 2025, Proceedings, Part I (Lecture Notes in Computer Science #15658)
by Josef Pieprzyk Willy SusiloThis three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed andselected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.
Information Security and Privacy: 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14–16, 2025, Proceedings, Part II (Lecture Notes in Computer Science #15659)
by Josef Pieprzyk Willy SusiloThis three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed andselected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.
Information Security and Privacy: 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14–16, 2025, Proceedings, Part III (Lecture Notes in Computer Science #15660)
by Josef Pieprzyk Willy SusiloThis three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed andselected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.
Information Security for Automatic Speaker Identification
by Fathi E. El-SamieThe author covers the fundamentals of both information and communication security including current developments in some of the most critical areas of automatic speech recognition. Included are topics on speech watermarking, speech encryption, steganography, multilevel security systems comprising speaker identification, real transmission of watermarked or encrypted speech signals, and more. The book is especially useful for information security specialist, government security analysts, speech development professionals, and for individuals involved in the study and research of speech recognition at advanced levels.
Information Security in Healthcare: Managing Risk (HIMSS Book Series)
by Terrell W. HerzigInformation Security in Healthcare is an essential guide for implementing a comprehensive information security management program in the modern healthcare environment. Combining the experience and insights of top healthcare IT managers and information security professionals, this book offers detailed coverage of myriad
Information Security in a Connected World: Celebrating the Life and Work of Ed Dawson (Lecture Notes in Computer Science #15600)
by Reihaneh Safavi-Naini Colin Boyd Leonie SimpsonThis Festschrift is a celebration of Ed Dawson's life and impact on research, teaching and leadership. Ed originally trained as a mathematician and first worked as a schoolteacher before joining Queensland Institute (later University) of Technology where he engaged with the emerging world of applied cryptology. He first concentrated on symmetric-key cryptography, analyzing randomness, searching for new building blocks and designing cryptographic engines, he later expanded his interests to public-key cryptography with a particular focus on the implementation aspects of elliptic curves. Ed was made a Fellow of the IACR for his visionary service and for fostering the Asia-Pacific cryptographic community. He cofounded conferences, workshops, courses and communities, first in Australia and then throughout the Pacific Rim. Ed's instincts and experiences were always interdisciplinary and he developed successful networks of researchers and practitioners in mathematics, computer science, engineering, business and law. In recent years he broadened his expertise to incorporate the human, socio-technical, aspects of security. Throughout his career Ed was a noted teacher, mentor and motivator, building and encouraging teams with effort, knowledge, enthusiasm and humor. His successes are reflected in the papers contributed to this volume.
Information Security of Intelligent Vehicles Communication: Overview, Perspectives, Challenges, and Possible Solutions (Studies in Computational Intelligence #978)
by Madhusudan SinghThis book highlights cyber-security overview, perspectives, and challenges that affect advanced Vehicular technology. It considers vehicular security issues and possible solutions, with the aim of providing secure vehicle-to-vehicle, vehicle-to-infrastructure and inside-of-vehicle communication. This book introduces vehicle cryptography mechanism including encryption and decryption approaches and cryptography algorithms such as symmetric and asymmetric cryptography, Hash functions and Digital Signature certificates for modern vehicles. It discusses cybersecurity structure and provides specific security challenges and possible solutions in Vehicular Communication such as vehicle to vehicle communication, vehicle to Infrastructure and in-vehicle communciation. It also presents key insights from security with regards to vehicles collaborative information technology. The more our vehicles become intelligent, the more we need to work on safety and security for vehicle technology. This book is of interest to automotive engineers and technical managers who want to learn about security technologies, and for those with a security background who want to learn about basic security issues in modern automotive applications.
Information Security, Privacy and Digital Forensics: Select Proceedings of the International Conference, ICISPD 2022 (Lecture Notes in Electrical Engineering #1075)
by S. S. Iyengar Sankita J. Patel Bhavesh N. Gohil Naveen Kumar ChaudharyThis volume comprises the select proceedings of the International Conference on Information Security, Privacy, and Digital Forensics (ICISPD 2022). The content discusses novel contributions and latest developments in cyber-attacks and defenses, computer forensics and cybersecurity database forensics, cyber threat intelligence, data analytics for security, anonymity, penetration testing, incident response, Internet of Things security, malware and botnets, social media security, humanitarian forensics, software and media piracy, crime analysis, hardware security, among others. This volume will be a useful guide for researchers across industry and academia working in the field of security, privacy, and digital forensics from both technological and social perspectives.
Information Security: 17th International Conference, ISSA 2018, Pretoria, South Africa, August 15–16, 2018, Revised Selected Papers (Communications in Computer and Information Science #973)
by Jan Eloff Hein Venter Marianne Loock Marijke Coetzee Mariki EloffThis book constitutes the refereed proceedings of the 17th International Conference on Information Security, ISSA 2018, held in Pretoria, South Africa, in August 2018. The 13 revised full papers presented were carefully reviewed and selected from 40 submissions. The papers are dealing with topics such as authentication; access control; digital (cyber) forensics; cyber security; mobile and wireless security; privacy-preserving protocols; authorization; trust frameworks; security requirements; formal security models; malware and its mitigation; intrusion detection systems; social engineering; operating systems security; browser security; denial-of-service attacks; vulnerability management; file system security; firewalls; Web protocol security; digital rights management; distributed systems security.
Information Security: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings (Lecture Notes in Computer Science #10599)
by Phong Q. Nguyen and Jianying ZhouThis book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017. The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.
Information Security: 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings (Lecture Notes in Computer Science #11060)
by Liqun Chen Mark Manulis Steve SchneiderThis book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018. The 26 full papers presented in this volume were carefully reviewed and selected from 59 submissions. The book also includes one invited talk in full-paper length. The papers were organized in topical sections named: software security; symmetric ciphers and cryptanalysis; data privacy and anonymization; outsourcing and assisted computing; advanced encryption; privacy-preserving applications; advanced signatures; and network security.
Information Security: 22nd International Conference, ISC 2019, New York City, NY, USA, September 16–18, 2019, Proceedings (Lecture Notes in Computer Science #11723)
by Michalis Polychronakis Zhiqiang Lin Charalampos PapamanthouThis book constitutes the proceedings of the 22nd International Conference on Information Security, ISC 2019, held in New York City, NY, USA, in September 2019. The 23 full papers presented in this volume were carefully reviewed and selected from 86 submissions. The papers were organized in topical sections named: Attacks and Cryptanalysis; Crypto I: Secure Computation and Storage; Machine Learning and Security; Crypto II: Zero-Knowledge Proofs; Defenses; Web Security; Side Channels; Malware Analysis; Crypto III: Signatures and Authentication.
Information Security: 23rd International Conference, ISC 2020, Bali, Indonesia, December 16–18, 2020, Proceedings (Lecture Notes in Computer Science #12472)
by Robert H. Deng Yannan Li Willy Susilo Fuchun Guo Rolly IntanThis book constitutes the proceedings of the 23rd International Conference on Information Security, ISC 2020, held in Bali, Indonesia, in December 2020. The 23 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers cover topics of research in theory and applications of information security, such as Security and privacy and Network security as well.
Information Security: 24th International Conference, ISC 2021, Virtual Event, November 10–12, 2021, Proceedings (Lecture Notes in Computer Science #13118)
by Sokratis Katsikas Joseph K. Liu Willy Susilo Weizhi Meng Rolly IntanThis book constitutes the proceedings of the 24rd International Conference on Information Security, ISC 2021, held virtually, in November 2021. The 21 full papers presented in this volume were carefully reviewed and selected from 87 submissions. The papers categorized into the following topical subheadings: cryptology; web and OS security; network security; detection of malware, attacks and vulnerabilities; and machine learning for security.
Information Security: 25th International Conference, ISC 2022, Bali, Indonesia, December 18–22, 2022, Proceedings (Lecture Notes in Computer Science #13640)
by Xiaofeng Chen Willy Susilo Fuchun Guo Rolly Intan Yudi ZhangThis book constitutes the proceedings of the 25th International Conference on Information Security, ISC 2022, which took place in Bali, Indonesia, in December 2022.The 21 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 72 submissions. The contributions were organized in topical sections as follows: Cryptography; Post-Quantum Cryptography; Cryptanalysis; Blockchain; Email and Web Security; Malware; and AI Security.
Information Security: 26th International Conference, ISC 2023, Groningen, The Netherlands, November 15–17, 2023, Proceedings (Lecture Notes in Computer Science #14411)
by Elias Athanasopoulos Bart MenninkThis book constitutes the proceedings of the 26th International Conference on Information Security, ISC 2023, which took place in Groningen, The Netherlands, in November 2023.The 29 full papers presented in this volume were carefully reviewed and selected from 90 submissions. The contributions were organized in topical sections as follows: privacy; intrusion detection and systems; machine learning; web security; mobile security and trusted execution; post-quantum cryptography; multiparty computation; symmetric cryptography; key management; functional and updatable encryption; and signatures, hashes, and cryptanalysis.
Information Security: 27th International Conference, ISC 2024, Arlington, VA, USA, October 23–25, 2024, Proceedings, Part I (Lecture Notes in Computer Science #15257)
by Nicky Mouha Nick NikiforakisThe two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23–25, 2024. The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections: Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security. Part II - Web Security; Intrusion Detection.
Information Security: 27th International Conference, ISC 2024, Arlington, VA, USA, October 23–25, 2024, Proceedings, Part II (Lecture Notes in Computer Science #15258)
by Nicky Mouha Nick NikiforakisThe two volume set LNCS 15257 + 15258 constitutes the proceedings of the 27th International Conference on Information Security, ISC 2024, held in Arlington, VA, USA, during October 23–25, 2024. The 33 full papers presented in these proceedings were carefully reviewed and selected from 111 submissions. The papers are organized in the following topical sections: Part I - Blockchain; Symmetric-Key Cryptography; Machine Learning; Software Security; Multi-Party Computation; Post-Quantum Cryptography; System Security. Part II - Web Security; Intrusion Detection.
Information Security: 28th International Conference, ISC 2025, Seoul, South Korea, October 20–22, 2025, Proceedings (Lecture Notes in Computer Science #16186)
by Sang Kil Cha Jeongeun ParkThe book constitutes the proceedings of the 28th International Conference on Information Security, ISC 2025, held in Seoul, South Korea, during October 20–22, 2025. The 32 full papers presented in these proceedings were carefully reviewed and selected from 77 submissions. The papers are organized in the following topical sections: Cryptanalysis and Cipher Security; Network Security; Post-quantum Cryptography; Side-Channel Attacks and Countermeasures; AI Security; Biometric Security; Malware Analysis; Systems Security; Access Control & Privacy; Smart Contracts and Blockchain Security.
Information Security: Design, Implementation, Measurement, and Compliance
by Timothy P. LaytonOrganizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs.
Information Security: Opportunities and Limitations
by Thomas LiedtkeThis book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their similarities and differences. The book presents currently used attack patterns and how to protect against them. Protection must be implemented on both a technical level (e.g., through the use of cryptography) and on an organizational and personnel level (e.g., through appropriate management systems and awareness training). How can one determine how secure data is? How can relevant threats be identified that need protection? How do risk analyses proceed?
Information Security: Principles and Practice
by Mark StampNow updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a practical approach to information security by focusing on real-world examples, this book is organized around four major themes: Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functions, random numbers, information hiding, and cryptanalysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel security and compartments, covert channels and inference control, security models such as BLP and Biba's model, firewalls, and intrusion detection systems Protocols: simple authentication protocols, session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, and GSM Software: flaws and malware, buffer overflows, viruses and worms, malware detection, software reverse engineering, digital rights management, secure software development, and operating systems security This Second Edition features new discussions of relevant security topics such as the SSH and WEP protocols, practical RSA timing attacks, botnets, and security certification. New background material has been added, including a section on the Enigma cipher and coverage of the classic "orange book" view of security. Also featured are a greatly expanded and upgraded set of homework problems and many new figures, tables, and graphs to illustrate and clarify complex topics and problems. A comprehensive solutions manual is available to assist in course development. Minimizing theory while providing clear, accessible content, Information Security remains the premier text for students and instructors in information technology, computer science, and engineering, as well as for professionals working in these fields.
Information Security: Principles and Practice
by Mark StampINFORMATION SECURITY Provides systematic guidance on meeting the information security challenges of the 21st century, featuring newly revised material throughout Information Security: Principles and Practice is the must-have book for students, instructors, and early-stage professionals alike. Author Mark Stamp provides clear, accessible, and accurate information on the four critical components of information security: cryptography, access control, network security, and software. Readers are provided with a wealth of real-world examples that clarify complex topics, highlight important security issues, and demonstrate effective methods and strategies for protecting the confidentiality and integrity of data. Fully revised and updated, the third edition of Information Security features a brand-new chapter on network security basics and expanded coverage of cross-site scripting (XSS) attacks, Stuxnet and other malware, the SSH protocol, secure software development, and security protocols. Fresh examples illustrate the Rivest-Shamir-Adleman (RSA) cryptosystem, elliptic-curve cryptography (ECC), SHA-3, and hash function applications including bitcoin and blockchains. Updated problem sets, figures, tables, and graphs help readers develop a working knowledge of classic cryptosystems, modern symmetric and public key cryptography, cryptanalysis, simple authentication protocols, intrusion and malware detection systems, quantum computing, and more. Presenting a highly practical approach to information security, this popular textbook: Provides up-to-date coverage of the rapidly evolving field of information security Explains session keys, perfect forward secrecy, timestamps, SSH, SSL, IPSec, Kerberos, WEP, GSM, and other authentication protocols Addresses access control techniques including authentication and authorization, ACLs and capabilities, and multilevel security and compartments Discusses software security issues, ranging from malware detection to secure software development Includes an instructor’s solution manual, PowerPoint slides, lecture videos, and additional teaching resources Information Security: Principles and Practice, Third Edition is the perfect textbook for advanced undergraduate and graduate students in all Computer Science programs, and remains essential reading for professionals working in industrial or government security.
Information Services Design: A Design Science Approach for Sustainable Knowledge (Routledge Studies in Organization and Systems)
by Fons WijnhovenInformation services are economic and organizational activities for informing people. Because informing is changing rapidly under the influence of internet-technologies, this book presents in Chapter 1 fundamental notions of information and knowledge, based on philosopher C.W. Churchman’s inquiring systems. This results in the identification of three product-oriented design theory aspects: content, use value and revenue. Chapter 2 describes how one can cope with these aspects by presenting process-oriented design theory. Both design theory insights are applied in chapters on information services challenges, their business concepts and processes, their architectures and exploitation. The final chapter discusses three case studies that integrate the insights from previous chapters, and it discusses some ideas for future research. This book gives students a coherent start to the topic of information services from a design science perspective, with a balance between technical and managerial aspects. Therefore, this book is useful for modern curricula of management, communication science and information systems. Because of its design science approach, it also explains design science principles. The book also serves professionals and academics in search of a foundational understanding of informing as a science and management practice.
Information Society Development through ICT Market Strategies
by Ermelinda Kordha Tolica Kozeta Sevrani Klodiana GoricaThis book examines the relationship between information society and information communication technology (ICT) markets, while evaluating the ICT impact on Albanian society and its economy. It offers insights on the country's information society development and compares it to other nations. The book begins with a general introduction to information society and efforts that can be used for ICT strategy. It then takes a look at ICT as an industrial sector and uncovers the importance for a strong ICT infrastructure management. Using this background information, the book finally explores the growing information society and ICT sector found in Albania. It measures the information society being created, and compares it to other countries in South Eastern Europe. Next the authors introduce a theoretical model for ICT driven development, focusing on ICT innovation and investment as factors that can affect the ICT market. These factors have also taken into account for strategy development in the national and industry level.